The recent development in communication technologies between individuals allows for the establishment of more informal collaborative map data projects which are called volunteered geographic information (VGI). These projects, such as OpenStreetMap (OSM) project, seek to create free alternative maps which let users add or input new materials to the data of others. The information of different VGI data sources is often not compliant to any standard and each organization is producing a dataset at various level of richness. In this research the assessment of semantic data quality provided by web sources, e.g. OSM will depend on a comparison with the information from standard sources. This will include the validity of semantic accuracy as one of the most important parameter of spatial data quality parameters. Semantic similarity testing covered feature classification, in effect comparing possible categories (legend classes) and actual attributes attached to features. This will be achieved by developing a tool, using Matlab programming language, for analysing and examining OSM semantic accuracy. To identify the strength of semantic accuracy assessment strategy, there are many factors should be considered. For instance, the confusion matrix of feature classifications can be assessed, and different statistical tests should be passed. The results revealed good semantic accuracy of OSM datasets.
In light of the increasing importance of interim financial statements they provided these lists of information that enables users of accounting information to make wise investment decisions and predict the company's activities in light of changes the updated rather than wait until the end of the year and accessing information provided by the annual financial statements. In light of this research has come to the most important set of conclusions the adoption of interim financial information has been audited by the external auditor to the availability of basic qualitative characteristics in the accounting information contained in the (appropriate and timely manner, reliability and comparability) and this in turn leads to the impact on reli
... Show MoreThe research aimed mainly to discover the effectiveness of the (PEOE) model in teaching science to develop the skills of generating and evaluating information and the emotional side of the scientific sense of the intermediate first grade students. An experimental approach with a quasi-experimental design called pre-test and post-test control design was used. The research sample consisted of (60) students, who were selected in a random cluster method, (30) students in the experimental group studied the unit "The Nature of Material" using the (PEOE) model, and (30) students in the control group studied according to the prevailing method of teaching. The research materials and tools were represented in: a teacher's guide for teaching the un
... Show MorePortable and stationary electrical generators became quite popular in Iraq soon after the shortage in national electrical
energy after 2003. Multi step risk assessment process is used in this study in the assessment of risks caused by
contamination of indoor air by lead particles emitted from domestic electrical generators. Two portable electrical
generators are tested under controlled indoor conditions (Radial LG (0.9 keV) fueled with benzene and oil and TigMax
(3 keV), fueled with benzene only). Lead particles in air were sampled by using portable dust sampler (Sniffer, L-30).
The atmospheric particulate sampling process is carried out in a flat located in the first floor of a three stories building
located in Baghdad
Radiation measuring devices need to periodic calibration process to examine their sensitivity and the extent of the response. This study is used to evaluate the radiation doses of the workers in the laboratories of the Directorate of Safety as a result of the use of point sources in calibrating of the devices in two ways, the first is the direct measurement by the FAG device and the others using RESRAD and RAD PRO programs. The total doses values using FAG were (2.57 μSv/y, 102.3 μSv/y and 20.75 μSv/y for TLD laboratory, Gamma spectroscopy analyses (GSA) laboratory and equipment store respectively, and the total doses that calculated using RESRAD and RAD PRO were 1.518 μSv/y, 76.65 μSv/y and 21.2 μSv/y for the above laboratories. t
... Show MoreObjectives: To assess pregnant women’s knowledge regarding syphilisand to find out the relationship between women’s knowledge regarding syphilis infection and demographic and reproductive variables. Methodology: A descriptive analytical study of non probable (purposive sample) of 250 pregnant women during their different gestational ages for the period (October 2nd to April 25th 2013) by using questionnaire format consists of demographic variables and items of women's knowledge regarding syphilis who are visiting primary health care centers in Al-Kharkh and Al-Rrusafa in Baghdad city. The coefficient relia
This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More